Robust security policy enforcement

Enforce policies across mobile devices administered by your organization. Protect devices and their data, control their usage with fine-grained passcode policies, and restrict access to the app store, gaming, and content.

Scalable endpoint configuration

Systems Manager also makes it easy to define and deploy network settings like wireless connectivity, security settings, and remote VPN access to all devices on your network at once. Instead of manually provisioning devices for network connectivity, or relying on end users to do so, configure settings such as WPA2-Enterprise in the dashboard, and let the cloud push the settings to end-user devices.

On-device content management

Backpack lets you deliver and manage documents, images, apps, and other files on Android devices. Bundle documents and files into a backpack and deliver it over-the-air to one device or thousands of devices, right from the dashboard. Built-in file synchronization keeps the content on the device up-to-date with the latest version of the file in the administrator’s backpack.

Prepare separate backpacks to be delivered to different classrooms, departments, or groups. Use tags to selectively deliver content to the appropriate devices.

Secure support for BYOD initiatives

Improve the security of BYOD initiatives by enforcing data encryption, remotely wiping lost devices, and even restricting network access to managed devices. Cisco Meraki wireless has built-in support for BYOD, making it easy to securely support BYOD — without extra appliances, licenses, or complex configuration.

Automatic device classification

Layer 7 client fingerprinting technology integrated into all Cisco Meraki products lets you see all the devices on your network, with no configuration required. Client devices are automatically identified and classified, letting you distinguish between mobile devices, desktop PCs, see device operating systems, and even see device hardware manufacturers.